PAM Backdoor
☆32Mar 29, 2023Updated 2 years ago
Alternatives and similar repositories for madlib
Users that are interested in madlib are comparing it to the libraries listed below
Sorting:
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Track your beacons in a redteam scoreboard☆15Oct 28, 2020Updated 5 years ago
- Linux PAM Backdoor☆368Nov 13, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 3 months ago
- accelerate your knowledge of LaTeX☆16Feb 28, 2025Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Dec 19, 2025Updated 3 months ago
- Unserialize bugs advisory☆11Oct 9, 2023Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated this week
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- ☆52May 4, 2025Updated 10 months ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Modular C2 server to tame your pack of wolves☆22Updated this week
- ☆19Dec 28, 2021Updated 4 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- ☆12Aug 14, 2025Updated 7 months ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago